A. F. Van-veenstra and M. Janssen, Architectural Principles for Orchestration of CrossOrganizational Service Delivery: Case Studies from the Netherlands, Practical Studies in E-Government: Best Practices from Around the World, pp.167-185, 2011.

K. Dunkerley and G. Tejay, Theorizing information security success: Towards secure eGovernment, International Journal of Electronic Government Research, vol.6, issue.3, pp.31-41, 2010.
DOI : 10.4018/jegr.2010070103

F. Belanger, J. S. Hiller, and W. J. Smith, Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, Journal of Strategic Information Systems, vol.11, pp.245-270, 2002.

L. Carter and A. Mcbride, Information privacy concerns and e-government: a research agenda. Transforming Government: People, Process and Policy, vol.4, pp.10-13, 2010.
DOI : 10.1108/17506161011028777

A. Rezgui, Z. Wen, and A. Bouguettaya, Enforcing Privacy in Interoperable E-Government Applications, Proceedings of the 2002 annual conference on Digital government research (dg.o), 2002.

V. Bryl, F. Dalpiaz, R. Ferrario, A. Mattioli, and A. Villafiorita, Evaluating procedural alternatives: A case study in e-voting, Electronic Government, vol.6, issue.2, pp.213-231, 2009.

D. P. Moynihan, Building Secure Elections: E-Voting, Security and Systems Theory, Public Administration Review, vol.64, issue.5, pp.515-528, 2004.
DOI : 10.1111/j.1540-6210.2004.00400.x

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.618.9318

M. Ramilli, Designing A New Electronic Voting System: Towards electronic voting systems, 2010.

A. D. Smith, Securing e-voting as a legitimate option for e-governance, Electronic Government, vol.4, issue.3, pp.269-289, 2007.
DOI : 10.1504/eg.2007.014162

J. J. Zhao and S. Y. Zhao, Opportunities and threats: A security assessment of state egovernment websites, Government Information Quarterly, vol.27, pp.49-56, 2010.

T. Heyman, K. Yskout, R. Scandariato, and W. Joosen, An Analysis of the Security Patterns Landscape, Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS '07), 2007.

I. Araujo and M. Weiss, Linking patterns and non-functional requirements, Proceedings of the ninth Conference on Pattern Language of Programs (PLoP, 2003.

E. B. Fernandez, J. Wu, and M. H. Fernandez, User group structures in object-oriented database authorization, Proceedings of the IFIP WG11.3 Working Conference on Database Security VII, pp.57-76, 1994.

J. P. Lehtonen, A pattern language for key management, Proceedings of the eight Conference on Pattern Language of Programs (PLoP, 2002.

D. Schmidt, M. Stal, H. Rohnert, and F. Buschmann, Pattern-Oriented Software Architecture, Patterns for Concurrent and Networked Hoboken, vol.2, 2000.

M. Schumacher, Security Engineering with Patterns: Origins, Theoretical Models, and New Applications, 2003.

E. B. Flanders, Data lter architecture pattern, Proceedings of the fifth Conference on Pattern Language of Programs (PLoP, 1999.

J. Yoder and J. Barcalow, Architectural patterns for enabling application security, 1997.

A. Braga, C. Rubira, and R. Dahab, Tropyc: A pattern language for cryptographic objectoriented software, Pattern Languages of Program Design, vol.4, 1998.

E. B. Fern and R. Pan, A pattern language for security models, Proceedings of the seventh Conference on Pattern Languages of Programs (PloP), 2001.

T. Heyman, K. Yskout, R. Scandariato, and W. Joosen, An analysis of the security patterns landscape, Proceedings of the Third International Workshop on Software Engineering for Secure Systems (SESS '07), 2007.

E. W. Pernul, G. Tjoa, and A. M. , Access controls by object-oriented concepts, Proceedings of the IFIP TC11WG11.3, Eleventh International Conference on Database Security XI: Status and Prospects, pp.325-340, 1998.

E. B. Fern and J. C. Sinibaldi, More patterns for operating systems access control, Proceedings of the eight European Conference on Patterns Language of Programming, 2003.

S. R. Kodituwakku, P. Bertok, and L. Zhao, Aplrac: A pattern language for designing and implementing role-based access control, Proceedings of the sixth European Conference on Pattern Languages of Programs, 2001.

L. Giuri, Role-based access control on the web using java, Proceedings of the fourth ACM workshop on Role-based access control, RBAC '99, 1999.
DOI : 10.1145/319171.319173

M. Schumacher, E. Fernandez-buglioni, D. Hybertson, F. Buschmann, and P. Sommerland, Security Patterns: Integrating Security and Systems Engineering, 2006.